Generating composite images using audio/video recording and communication devices
Some embodiments provide methods for providing images of a person generated by two or more A/V recording and communication devices to one or more users, via a user's client device. For example, first image data may be received from a first A/V recording and communication device at a first location and second image data may be received from a second A/V recording and communication device at a second location. The first image data and the second image data may be analyzed to determine a person depicted in the first image data and a person depicted in the second image data is the same person. In response, a user alert may be generated including data representative of a first facial image of the person and a second facial image of the person. The user alert may then be transmitted to a user's client device.
Latest Amazon Patents:
This application claims priority to provisional application Ser. No. 62/510,271, filed on May 24, 2017, the entire contents of which are hereby incorporated by reference.
TECHNICAL FIELDThe present embodiments relate to audio/video (A/V) recording and communication devices, including A/V recording and communication doorbell systems. In particular, the present embodiments relate to improvements in the functionality of A/V recording and communication devices that strengthen the ability of such devices to reduce crime and enhance public safety.
BACKGROUNDHome safety is a concern for many homeowners and renters. Those seeking to protect or monitor their homes often wish to have video and audio communications with visitors, for example, those visiting an external door or entryway. Audio/Video (A/V) recording and communication devices, such as doorbells, provide this functionality, and can also aid in crime detection and prevention. For example, audio and/or video captured by an A/V recording and communication device can be uploaded to the cloud and recorded on a remote server. Subsequent review of the A/V footage can aid law enforcement in capturing perpetrators of home burglaries and other crimes. Further, the presence of one or more A/V recording and communication devices on the exterior of a home, such as a doorbell at the entrance to the home, acts as a powerful deterrent against would-be burglars.
SUMMARYThe various embodiments of the present generating composite facial images using audio/video recording and communication devices have several features, no single one of which is solely responsible for their desirable attributes. Without limiting the scope of the present embodiments as expressed by the claims that follow, their more prominent features now will be discussed briefly. After considering this discussion, and particularly after reading the section entitled “Detailed Description,” one will understand how the features of the present embodiments provide the advantages described herein.
One aspect of the present embodiments includes the realization that audio/video (A/V) recording and communication devices (e.g., doorbells) other than the present embodiments sometimes capture only partial facial images of persons in the field of view of the camera. Partial facial images sometimes do not provide enough information to allow for a positive identification of the person in the video or still image. The present embodiments solve this problem by leveraging the functionality of A/V recording and communication devices, such as A/V recording and communication doorbells, to generate composite facial images based on partial facial image(s) captured by multiple cameras. These composite facial images provide a more easily identifiable picture of the person(s) in the field of view of the camera, which facilitates positive identification of criminal perpetrators, thereby enhancing public safety by making it easier for such perpetrators to be apprehended and convicted.
In particular, sometimes the cameras of two or more A/V recording and communication devices each capture partial facial images (e.g., from different angles and/or vantage points) of the same person. The partial facial images can be of limited value in identifying the person(s) in the images, due to the lack of a complete picture of the person's face in any one image. It would be advantageous, then, if partial facial images could be combined to form a composite image that shows the entire face (or at least a more complete face) of a person captured in multiple images. But A/V recording and communication devices other than the present embodiments do not provide the ability to identify image data including partial facial images from two or more cameras, or to determine that the partial facial images are of the same person. The present embodiments solve this problem by enabling image data from multiple A/V recording and communication devices to be analyzed so that partial facial images of a same person can be identified. The partial facial images of the same person are then combined in the present embodiments to generate a composite facial image of a complete face of the person (or at least a more complete face than any of the partial images alone). With a composite facial image, the identity of the person in the partial facial images can be more effectively determined, thereby enabling users to make more educated decisions of whether the person is suspicious or dangerous, and also whether or not to notify law enforcement, family members, neighbors, or the like. The composite facial image can also make it easier for law enforcement to identify, apprehend, and convict the criminal perpetrator (in instances where the person in the composite facial image has committed one or more criminal acts).
In some embodiments, the combined partial facial images may be obtained from two or more A/V recording and communication devices that are located at different properties/addresses and/or associated with different client devices (e.g., different users). In other embodiments, the combined partial facial images may be obtained from two or more A/V recording and communication devices that are located at a same property/address and/or associated with a same client device (e.g., a single user). In still further embodiments, the combined partial facial images may be obtained from a single A/V recording and communication device that captures images of the person from multiple angles.
In a first aspect, a method for generating a composite facial image of a face of a person using first image data from a first audio/video (A/V) recording and communication device having a first camera and second image data from a second A/V recording and communication device having a second camera is provided, the method comprising receiving the first image data from the first camera and the second image data from the second camera, analyzing the first image data and the second image data, based on the analyzing, determining that the first image data includes a first partial facial image of the person and the second image data includes a second partial facial image of the person, wherein the first partial facial image includes a first portion of the face of the person and the second partial facial image does not include the first portion of the face of the person, generating the composite facial image of the person based, at least in part, on the first partial facial image and the second partial facial image, and generating and transmitting, to a client device, a user alert including the composite facial image.
In an embodiment of the first aspect, the user alert includes streaming video footage recorded by at least one of the first camera of the first A/V recording and communication device and the second camera of the second A/V recording and communication device.
In another embodiment of the first aspect, the first and second A/V recording and communication devices are associated with a same user.
In another embodiment of the first aspect, the first and second A/V recording and communication devices are installed at a same address.
In another embodiment of the first aspect, the method is performed by a hub device in network communication with the first and second A/V recording and communication devices.
In another embodiment of the first aspect, the method is performed by the first A/V recording and communication device.
In another embodiment of the first aspect, the first and second A/V recording and communication devices are associated with different users.
In another embodiment of the first aspect, the first and second A/V recording and communication devices are installed at different addresses.
In another embodiment of the first aspect, the composite facial image is a three-dimensional projection of a head of the person.
In another embodiment of the first aspect, the composite facial image is programmed to be rotatable by a user of the client device.
Another embodiment of the first aspect further comprises comparing the composite facial image to a database of suspicious persons, based on the comparing, determining that the person is a suspicious person, based on the determining that the person is a suspicious person, retrieving information about the person from the database, and transmitting the retrieved information with the user alert including the composite facial image.
Another embodiment of the first aspect further comprises transmitting a request to the client device to determine if the person is authorized based on the composite facial image, and in response to the transmitting, receiving a response to the request, wherein if the person is authorized, adding the person to a database of authorized persons, and if the person is not authorized, adding the person to a database of suspicious persons.
In another embodiment of the first aspect, analyzing the first image data and the second image data comprises identifying first facial features from the first image data and second facial features from the second image data, and comparing the first facial features and the second facial features.
In a second aspect, a method for generating a composite facial image of a face of a person using first image data from a first audio/video (A/V) recording and communication device having a first camera and second image data from a second A/V recording and communication device having a second camera is provided, the method comprising receiving the first image data from the first camera and the second image data from the second camera, the first image data including a first partial facial image and the second image data including a second partial facial image, analyzing the first partial facial image and the second partial facial image, based on the analyzing, determining that the first partial facial image includes a first portion of the face of the person and the second partial facial image includes a second portion of the face of the person different from the first portion, generating the composite facial image of the face of the person based, at least in part, on the first partial facial image and the second partial facial image, and generating and transmitting, to a client device, a user alert including the composite facial image.
In an embodiment of the second aspect, the user alert includes streaming video footage recorded by at least one of the first camera of the first A/V recording and communication device and the second camera of the second A/V recording and communication device.
In another embodiment of the second aspect, the first and second A/V recording and communication devices are associated with a same user.
In another embodiment of the second aspect, the first and second A/V recording and communication devices are installed at a same address.
In another embodiment of the second aspect, the method is performed by a hub device in network communication with the first and second A/V recording and communication devices.
In another embodiment of the second aspect, the method is performed by the first A/V recording and communication device.
In another embodiment of the second aspect, the first and second A/V recording and communication devices are associated with different users.
In another embodiment of the second aspect, the first and second A/V recording and communication devices are installed at different addresses.
In another embodiment of the second aspect, the composite facial image is a three-dimensional projection of a head of the person.
In another embodiment of the second aspect, the composite facial image is programmed to be rotatable by a user of the client device.
Another embodiment of the second aspect further comprises comparing the composite facial image to a database of suspicious persons, based on the comparing, determining that the person is a suspicious person, based on the determining that the person is a suspicious person, retrieving information about the person from the database, and transmitting the retrieved information with the user alert including the composite facial image.
Another embodiment of the second aspect further comprises transmitting a request to the client device to determine if the person is authorized based on the composite facial image, and in response to the transmitting, receiving a response to the request, wherein. if the person is authorized, adding the person to a database of authorized persons, and if the person is not authorized, adding the person to a database of suspicious persons.
In another embodiment of the second aspect analyzing the first image data and the second image data comprises identifying first facial features from the first image data and second facial features from the second image data; and comparing the first facial features and the second facial features.
In a third aspect, a computer program application is provided for analyzing image data from at least a first audio/video (A/V) recording and communication device having a first camera and a second A/V recording and communication device having a second camera, the computer program application being embodied in code executable by a processor, which when executed causes the computer program application to receive first image data from the first camera and second image data from the second camera, analyze the first image data and the second image data, based on the analyzing, determine that the first image data includes a first partial facial image of a face of a person and the second image data includes a second partial facial image of the face of the person, the first partial facial image including a first portion of the face of the person and the second partial facial image not including the first portion of the face of the person, generate a composite facial image of the person based, at least in part, on the first partial facial image and the second partial facial image, and generate and transmit, to a client device, a user alert including the composite facial image.
In an embodiment of the third aspect, the user alert includes streaming video footage recorded by at least one of the first camera of the first A/V recording and communication device and the second camera of the second A/V recording and communication device.
In another embodiment of the third aspect, the first and second A/V recording and communication devices are associated with a same user.
In another embodiment of the third aspect, the first and second A/V recording and communication devices are installed at a same address.
In another embodiment of the third aspect, the code is executed by a processor of a hub device in network communication with the first and second A/V recording and communication devices.
In another embodiment of the third aspect, the code is executed by a processor of the first A/V recording and communication device.
In another embodiment of the third aspect, the first and second A/V recording and communication devices are associated with different users.
In another embodiment of the third aspect, the first and second A/V recording and communication devices are installed at different addresses.
In another embodiment of the third aspect, the composite facial image is a three-dimensional projection of a head of the person.
In another embodiment of the third aspect, the composite facial image is programmed to be rotatable by a user of the client device.
Another embodiment of the third aspect further comprises comparing the composite facial image to a database of suspicious persons, based on the comparing, determining that the person is a suspicious person, based on the determining that the person is a suspicious person, retrieving information about the person from the database, and transmitting the retrieved information with the user alert including the composite facial image.
Another embodiment of the third aspect, further comprises transmitting a request to the client device to determine if the person is authorized based on the composite facial image, and in response to the transmitting, receiving a response to the request, wherein if the person is authorized, adding the person to a database of authorized persons, and if the person is not authorized, adding the person to a database of suspicious persons.
In another embodiment of the third aspect, a computer program application is provided wherein analyzing the first image data and the second image data comprises identifying first facial features from the first image data and second facial features from the second image data and comparing the first facial features and the second facial features.
In a fourth aspect, a method for generating an alert including a composite facial image of a face of a person using image data from at least a first audio/video (A/V) recording and communication device having a first camera and a second A/V recording and communication device having a second camera is provided, the method comprising receiving first image data from the first camera and second image data from the second camera, receiving a request from a first client device to provide the alert and to transmit the first image data to at least one second client device, in response to receiving the request, analyzing the first image data and the second image data, based on the analyzing, determining that the first image data includes a first partial facial image of the person and the second image data includes a second partial facial image of the person, wherein the first partial facial image includes a first portion of the face of the person and the second partial facial image does not include the first portion of the face of the person, generating the composite facial image of the person based, at least in part, on the first partial facial image and the second partial facial image, and generating and transmitting, to the at least one second client device, the alert including the first image data and the composite facial image.
In an embodiment of the fourth aspect, the alert includes streaming video footage recorded by at least one of the first camera of the first A/V recording and communication device and the second camera of the second A/V recording and communication device.
In another embodiment of the fourth aspect, the method is performed by a hub device in network communication with the first and second A/V recording and communication devices.
In another embodiment of the fourth aspect, the first and second A/V recording and communication devices are associated with different users.
In another embodiment of the fourth aspect, the first and second A/V recording and communication devices are installed at different addresses.
Another embodiment of the fourth aspect further comprises comparing the composite facial image to a database of suspicious persons, based on the comparing, determining that the person is a suspicious person, based on the determining that the person is a suspicious person, retrieving information about the person from the database, and transmitting the retrieved information with the user alert including the composite facial image.
Another embodiment of the fourth aspect further comprises transmitting a request to the client device to determine if the person is authorized based on the composite facial image, and in response to the transmitting, receiving a response to the request, wherein if the person is authorized, adding the person to a database of authorized persons, and if the person is not authorized, adding the person to a database of suspicious persons.
In another embodiment of the fourth aspect, analyzing the first image data and the second image data comprises identifying first facial features from the first image data and second facial features from the second image data, and comparing the first facial features and the second facial features.
In a fifth aspect, a method for generating an alert including a composite facial image of a face of a person using image data from a plurality of audio/video (A/V) recording and communication devices each having a camera is provided, the method comprising receiving a neighborhood join request from a first client device associated with a first one of the plurality of A/V recording and communication devices, in response to a first motion event, receiving first image data from a first camera of the first A/V recording and communication device, in response to a second motion event, receiving second image data from a second camera of a second one of the A/V recording and communication devices, the second A/V recording and communication device being associated with a second client device, in response to receiving the neighborhood join request, determining that the first motion event and the second motion event satisfy a predetermined relationship, based on the determining, analyzing the first image data and the second image data, based on the analyzing, determining that the first image data includes a first partial facial image of the person and the second image data includes a second partial facial image of the person, wherein the first partial facial image includes a first portion of the face of the person and the second partial facial image does not include the first portion of the face of the person, generating the composite facial image of the person based, at least in part, on the first partial facial image and the second partial facial image, and generating and transmitting, to at least one of the first and second client devices, the alert including the composite facial image.
In an embodiment of the fifth aspect, the alert includes streaming video footage recorded by at least one of the first camera of the first A/V recording and communication device and the second camera of the second A/V recording and communication device.
In another embodiment of the fifth aspect, the first and second A/V recording and communication devices are associated with different users.
In another embodiment of the fifth aspect, the first and second A/V recording and communication devices are installed at different addresses.
In another embodiment of the fifth aspect, the predetermined relationship includes at least one of a temporal relationship and a proximity relationship between the first and second motion events.
In another embodiment of the fifth aspect, the temporal relationship includes a time gap between the first and second motion events.
In another embodiment of the fifth aspect, the time gap is less than 10 minutes.
In another embodiment of the fifth aspect, the proximity relationship includes a distance between the first and second A/V recording and communication devices.
In another embodiment of the fifth aspect, the distance is less than a mile.
In another embodiment of the fifth aspect, the alert including the composite facial image is transmitted to a plurality of additional client devices.
In another embodiment of the fifth aspect, determining that the first motion event and the second motion event satisfy a predetermined relationship includes at least one of determining that the first motion event and the second motion event occurred within a predetermined time gap and determining that the first A/V recording and communication device is within a predetermined distance from the second A/V recording and communication device.
The various embodiments of the present generating composite facial images using audio/video recording and communication devices now will be discussed in detail with an emphasis on highlighting the advantageous features. These embodiments depict the novel and non-obvious generating composite facial images using audio/video recording and communication devices shown in the accompanying drawings, which are for illustrative purposes only. These drawings include the following figures, in which like numerals indicate like parts:
The following detailed description describes the present embodiments with reference to the drawings. In the drawings, reference numbers label elements of the present embodiments. These reference numbers are reproduced below in connection with the discussion of the corresponding drawing features.
The embodiments of the present streaming and storing video for audio/video recording and communication devices are described below with reference to the figures. These figures, and their written descriptions, indicate that certain components of the apparatus are formed integrally (e.g., a single unitary piece), and certain other components are formed as separate pieces. Components shown and described herein as being formed integrally may in alternative embodiments be formed as separate pieces. Further, components shown and described herein as being formed as separate pieces may in alternative embodiments be formed integrally.
With reference to
With further reference to
The network 112 may be any wireless network or any wired network, or a combination thereof, configured to operatively couple the above-mentioned modules, devices, and systems as shown in
According to one or more aspects of the present embodiments, when a person (may be referred to interchangeably as “visitor”) arrives at the A/V recording and communication device 100, the A/V recording and communication device 100 detects the visitor's presence and begins capturing video images within a field of view of the camera 102. The A/V recording and communication device 100 may also capture audio through the microphone 104. The A/V recording and communication device 100 may detect the visitor's presence by detecting motion using the camera 102 and/or a motion sensor, and/or by detecting that the visitor has depressed the front button on the A/V recording and communication device 100 (in embodiments in which the A/V recording and communication device 100 comprises a doorbell).
In response to the detection of the visitor, the A/V recording and communication device 100 sends an alert to the user's client device 114 (
The video images captured by the camera 102 of the A/V recording and communication device 100 (and the audio captured by the microphone 104) may be uploaded to the cloud and recorded on the remote storage device 116 (
With further reference to
The backend API 120 illustrated
The backend API 120 illustrated in
At block B202, a communication module of the A/V recording and communication device 100 sends a connection request, via the user's network 110 and the network 112, to a device in the network 112. For example, the network device to which the request is sent may be a server such as the server 118. The server 118 may comprise a computer program and/or a machine that waits for requests from other machines or software (clients) and responds to them. A server typically processes data. One purpose of a server is to share data and/or hardware and/or software resources among clients. This architecture is called the client-server model. The clients may run on the same computer or may connect to the server over a network. Examples of computing servers include database servers, file servers, mail servers, print servers, web servers, game servers, and application servers. The term server may be construed broadly to include any computerized process that shares a resource to one or more client processes.
In response to the request, at block B204 the network device may connect the A/V recording and communication device 100 to the user's client device 114 through the user's network 110 and the network 112. At block B206, the A/V recording and communication device 100 may record available audio and/or video data using the camera 102, the microphone 104, and/or any other sensor available. At block B208, the audio and/or video data is transmitted (streamed) from the A/V recording and communication device 100 to the user's client device 114 via the user's network 110 and the network 112. At block B210, the user may receive a notification on his or her client device 114 with a prompt to either accept or deny the call.
At block B212, the process determines whether the user has accepted or denied the call. If the user denies the notification, then the process advances to block B214, where the audio and/or video data is recorded and stored at a cloud server. The session then ends at block B216 and the connection between the A/V recording and communication device 100 and the user's client device 114 is terminated. If, however, the user accepts the notification, then at block B218 the user communicates with the visitor through the user's client device 114 while audio and/or video data captured by the camera 102, the microphone 104, and/or other sensors is streamed to the user's client device 114. At the end of the call, the user may terminate the connection between the user's client device 114 and the A/V recording and communication device 100 and the session ends at block B216. In some of the present embodiments, the audio and/or video data may be recorded and stored at a cloud server (block B214) even if the user accepts the notification and communicates with the visitor through the user's client device 114.
Many of today's homes include a wired doorbell system that does not have A/V communication capabilities. Instead, standard wired doorbell systems include a button outside the home next to the front door. The button activates a signaling device (such as a bell or a buzzer) inside the building. Pressing the doorbell button momentarily closes the doorbell circuit, which may be, for example, a single-pole, single-throw (SPST) push button switch. One terminal of the button is wired to a terminal on a transformer. The transformer steps down the 120-volt or 240-volt household AC electrical power to a lower voltage, typically 16 to 24 volts. Another terminal on the transformer is wired to a terminal on the signaling device. Another terminal on the signaling device is wired to the other terminal on the button. A common signaling device includes two flat metal bar resonators, which are struck by plungers operated by two solenoids. The flat bars are tuned to different notes. When the doorbell button is pressed, the first solenoid's plunger strikes one of the bars, and when the button is released, a spring on the plunger pushes the plunger up, causing it to strike the other bar, creating a two-tone sound (“ding-dong”).
Many current A/V recording and communication doorbell systems (other than the present embodiments) are incompatible with existing wired doorbell systems of the type described in the preceding paragraph. One reason for this incompatibility is that the A/V recording and communication doorbell draws an amount of power from the household AC electrical power supply that is above the threshold necessary for causing the signaling device to sound. The A/V recording and communication doorbell thus causes frequent inadvertent sounding of the signaling device, which is not only bothersome to the home's occupant(s), but also undermines the usefulness of the doorbell. The present embodiments solve this problem by limiting the power consumption of the A/V recording and communication doorbell to an amount that is below the threshold necessary for causing the signaling device to sound. Embodiments of the present A/V recording and communication doorbell can thus be connected to the existing household AC power supply and the existing signaling device without causing inadvertent sounding of the signaling device.
Several advantages flow from the ability of the present embodiments to be connected to the existing household AC power supply. For example, the camera of the present A/V recording and communication doorbell can be powered on continuously. In a typical battery-powered A/V recording and communication doorbell, the camera is powered on only part of the time so that the battery does not drain too rapidly. The present embodiments, by contrast, do not rely on a battery as a primary (or sole) power supply, and are thus able to keep the camera powered on continuously. Because the camera is able to be powered on continuously, it can always be recording, and recorded footage can be continuously stored in a rolling buffer or sliding window. In some of the present embodiments, about 10-15 seconds of recorded footage can be continuously stored in the rolling buffer or sliding window. Also, because the camera is able to be powered on continuously, it can be used for motion detection, thus eliminating any need for a separate motion detection device, such as a passive infrared sensor (PIR). Eliminating the PIR simplifies the design of the A/V recording and communication doorbell and enables the doorbell to be made more compact. Also, because the camera is able to be powered on continuously, it can be used as a light detector for use in controlling the current state of the IR cut filter and turning the IR LED on and off. Using the camera as a light detector eliminates any need for a separate light detector, thereby further simplifying the design of the A/V recording and communication doorbell and enabling the doorbell to be made even more compact.
With further reference to
With further reference to
With further reference to
The transfer of digital audio between the user and a visitor may be compressed and decompressed using the audio CODEC 153, which is operatively coupled to the processor 160. When the visitor speaks, audio from the visitor is compressed by the audio CODEC 153, digital audio data is sent through the communication module 146 to the network 112 via the user's network 110, routed by the server 118 and delivered to the user's client device 114. When the user speaks, after being transferred through the network 112, the user's network 110, and the communication module 146, the digital audio data is decompressed by the audio CODEC 153 and emitted to the visitor through the speaker 152, which is driven by the speaker driver 151.
With further reference to
With reference to
With reference to
With reference to
With further reference to
With further reference to
The lower portion 216 of the shield 192 may comprise a material that is substantially transparent to infrared (IR) light, but partially or mostly opaque with respect to light in the visible spectrum. For example, in certain embodiments the lower portion 216 of the shield 192 may comprise a plastic, such as polycarbonate. The lower portion 216 of the shield 192, therefore, does not interfere with transmission of IR light from the IR light source 156, which is located behind the lower portion 216. As described in detail below, the IR light source 156 and the IR cut filter 158, which are both operatively connected to the processor 160, facilitate “night vision” functionality of the camera 154.
The upper portion 214 and/or the lower portion 216 of the shield 192 may abut an underlying cover 220 (
With reference to
With reference to
The LEDs 162 and the light pipe 232 may function as visual indicators for a visitor and/or a user. For example, the LEDs 162 may illuminate upon activation or stay illuminated continuously. In one aspect, the LEDs 162 may change color to indicate that the front button 148 has been pressed. The LEDs 162 may also indicate that the battery 142 needs recharging, or that the battery 142 is currently being charged, or that charging of the battery 142 has been completed. The LEDs 162 may indicate that a connection to the user's wired/wireless network is good, limited, poor, or not connected. The LEDs 162 may be used to guide the user through setup or installation steps using visual cues, potentially coupled with audio cues emitted from the speaker 152.
With further reference to
With further reference to
With further reference to
With reference to
The IR LED 242 may be triggered to activate when a low level of ambient light is detected. When activated, IR light emitted from the IR LED 242 illuminates the camera 154's field of view. The camera 154, which may be configured to detect IR light, may then capture the IR light emitted by the IR LED 242 as it reflects off objects within the camera 154's field of view, so that the A/V recording and communication doorbell 130 can clearly capture images at night (may be referred to as “night vision”).
With reference to
With reference back to
With reference to
With reference to
As described above, the present embodiments advantageously limit the power consumption of the A/V recording and communication doorbell to an amount that is below the threshold necessary for causing the signaling device to sound (except when the front button of the doorbell is pressed). The present A/V recording and communication doorbell can thus be connected to the existing household AC power supply and the existing signaling device without causing inadvertent sounding of the signaling device.
Several advantages flow from the ability of the present embodiments to be connected to the existing household AC power supply. For example, the camera of the present A/V recording and communication doorbell can be powered on continuously. In a typical battery-powered A/V recording and communication doorbell, the camera is powered on only part of the time so that the battery does not drain too rapidly. The present embodiments, by contrast, do not rely on a battery as a primary (or sole) power supply, and are thus able to keep the camera powered on continuously. Because the camera is able to be powered on continuously, it can always be recording, and recorded footage can be continuously stored in a rolling buffer or sliding window. In some of the present embodiments, about 10-15 seconds of recorded footage can be continuously stored in the rolling buffer or sliding window. Also, because the camera is able to be powered on continuously, it can be used for motion detection, thus eliminating any need for a separate motion detection device, such as a passive infrared sensor (PIR). Eliminating the PIR simplifies the design of the A/V recording and communication doorbell and enables the doorbell to be made more compact, although in some alternative embodiments the doorbell may include one or more PIRs and/or other motion detectors, heat source detectors, etc. Also, because the camera is able to be powered on continuously, it can be used as a light detector for use in controlling the current state of the IR cut filter and turning the IR LED on and off. Using the camera as a light detector eliminates any need for a separate light detector, thereby further simplifying the design of the A/V recording and communication doorbell and enabling the doorbell to be made even more compact, although in some alternative embodiments the doorbell may include a separate light detector.
The doorbell 330 includes a faceplate 335 mounted to a back plate 339 (
With reference to
With reference to
With further reference to
The camera PCB 347 may be secured within the doorbell with any suitable fasteners, such as screws, or interference connections, adhesives, etc. The camera PCB 347 comprises various components that enable the functionality of the camera 334 of the doorbell 330, as described below. Infrared light-emitting components, such as infrared LED's 368, are coupled to the camera PCB 347 and may be triggered to activate when a light sensor detects a low level of ambient light. When activated, the infrared LED's 368 may emit infrared light through the enclosure 331 and/or the camera 334 out into the ambient environment. The camera 334, which may be configured to detect infrared light, may then capture the light emitted by the infrared LED's 368 as it reflects off objects within the camera's 334 field of view, so that the doorbell 330 can clearly capture images at night (may be referred to as “night vision”).
With continued reference to
With continued reference to
With continued reference to
With continued reference to
With continued reference to
With continued reference to
With reference to
With further reference to
With further reference to
The speakers 357 and the microphone 358 may be coupled to the camera processor 370 through an audio CODEC 361. For example, the transfer of digital audio from the user's client device 114 and the speakers 357 and the microphone 358 may be compressed and decompressed using the audio CODEC 361, coupled to the camera processor 370. Once compressed by audio CODEC 361, digital audio data may be sent through the communication module 364 to the network 112, routed by one or more servers 118, and delivered to the user's client device 114. When the user speaks, after being transferred through the network 112, digital audio data is decompressed by audio CODEC 361 and emitted to the visitor via the speakers 357.
With further reference to
With further reference to
With further reference to
With further reference to
As described above, one aspect of the present embodiments includes the realization that audio/video (A/V) recording and communication devices (e.g., doorbells) other than the present embodiments sometimes capture only partial facial images of persons in the field of view of the camera. Partial facial images sometimes do not provide enough information to allow for a positive identification of the person in the video or still image. The present embodiments solve this problem by leveraging the functionality of A/V recording and communication devices, such as A/V recording and communication doorbells, to generate composite facial images based on partial facial image(s) captured by multiple cameras. These composite facial images provide a more easily identifiable picture of the person(s) in the field of view of the camera, which facilitates positive identification of criminal perpetrators, thereby enhancing public safety by making it easier for such perpetrators to be apprehended and convicted.
In particular, sometimes the cameras of two or more A/V recording and communication devices each capture partial facial images (e.g., from different angles and/or vantage points) of the same person. The partial facial images can be of limited value in identifying the person(s) in the images, due to the lack of a complete picture of the person's face in any one image. It would be advantageous, then, if partial facial images could be combined to form a composite image that shows the entire face (or at least a more complete face) of a person captured in multiple images. But A/V recording and communication devices other than the present embodiments do not provide the ability to identify image data including partial facial images from two or more cameras, or to determine that the partial facial images are of the same person. The present embodiments solve this problem by enabling image data from multiple A/V recording and communication devices to be analyzed so that partial facial images of a same person can be identified. The partial facial images of the same person are then combined in the present embodiments to generate a composite facial image of a complete face of the person (or at least a more complete face than any of the partial images alone). With a composite facial image, the identity of the person in the partial facial images can be more effectively determined, thereby enabling users to make more educated decisions of whether the person is suspicious or dangerous, and also whether or not to notify law enforcement, family members, neighbors, or the like. The composite facial image can also make it easier for law enforcement to identify, apprehend, and convict the criminal perpetrator (in instances where the person in the composite facial image has committed one or more criminal acts).
In some embodiments, the combined partial facial images may be obtained from two or more A/V recording and communication devices that are located at different properties/addresses and/or associated with different client devices (e.g., different users). In other embodiments, the combined partial facial images may be obtained from two or more A/V recording and communication devices that are located at a same property/address and/or associated with a same client device (e.g., a single user). In still further embodiments, the combined partial facial images may be obtained from a single A/V recording and communication device that captures images of the person from multiple angles.
For example, some of the present embodiments generate a composite facial image by receiving first image data from a first camera of a first A/V recording and communication device and second image data from a second camera of a second A/V recording and communication device, and analyzing the first image data and the second image data. Based on the analyzing, it is determined that the first image data includes a first partial facial image of the person and the second image data includes a second partial facial image of the person, where the first partial facial image includes a first portion of the face of the person and the second partial facial image does not include the first portion of the face of the person. In other words, the first and second partial facial images do not depict identical portions of the person's face. Based, at least in part, on the first partial facial image and the second partial facial image, the composite facial image of the person is generated. In some embodiments, a user alert including the composite facial image may also be generated and transmitted to a client device.
In various embodiments, these steps can be carried out either entirely within the A/V recording and communication device(s), or with the use of the A/V recording and communication device(s) and one or more backend processors, one or more databases, one or more hub devices in network communication with the A/V recording and communication device(s), and/or one or more networks enabling communication between the devices that make up the described system.
Some of the present embodiments may comprise computer vision for one or more aspects, such as object and/or facial recognition. Computer vision includes methods for acquiring, processing, analyzing, and understanding images and, in general, high-dimensional data from the real world in order to produce numerical or symbolic information, e.g. in the form of decisions. Computer vision seeks to duplicate the abilities of human vision by electronically perceiving and understanding an image. Understanding in this context means the transformation of visual images (the input of the retina) into descriptions of the world that can interface with other thought processes and elicit appropriate action. This image understanding can be seen as the disentangling of symbolic information from image data using models constructed with the aid of geometry, physics, statistics, and learning theory. Computer vision has also been described as the enterprise of automating and integrating a wide range of processes and representations for vision perception. As a scientific discipline, computer vision is concerned with the theory behind artificial systems that extract information from images. The image data can take many forms, such as video sequences, views from multiple cameras, or multi-dimensional data from a scanner. As a technological discipline, computer vision seeks to apply its theories and models for the construction of computer vision systems.
One aspect of computer vision comprises determining whether or not the image data contains some specific object, feature, or activity. Different varieties of computer vision recognition include: Object Recognition (also called object classification)—One or several pre-specified or learned objects or object classes can be recognized, usually together with their 2D positions in the image or 3D poses in the scene. Identification—An individual instance of an object is recognized. Examples include identification of a specific person's face or fingerprint, identification of handwritten digits, or identification of a specific vehicle. Detection—The image data are scanned for a specific condition. Examples include detection of possible abnormal cells or tissues in medical images or detection of a vehicle in an automatic road toll system. Detection based on relatively simple and fast computations is sometimes used for finding smaller regions of interesting image data that can be further analyzed by more computationally demanding techniques to produce a correct interpretation.
Several specialized tasks based on computer vision recognition exist, such as: Optical Character Recognition (OCR)—Identifying characters in images of printed or handwritten text, usually with a view to encoding the text in a format more amenable to editing or indexing (e.g. ASCII). 2D Code Reading—Reading of 2D codes such as data matrix and QR codes. Facial Recognition. Shape Recognition Technology (SRT)—Differentiating human beings (e.g. head and shoulder patterns) from objects.
Typical functions and components (e.g. hardware) found in many computer vision systems are described in the following paragraphs. The present embodiments may include at least some of these aspects. For example, with reference to
Image acquisition—A digital image is produced by one or several image sensors, which, besides various types of light-sensitive cameras, may include range sensors, tomography devices, radar, ultra-sonic cameras, etc. Depending on the type of sensor, the resulting image data may be a 2D image, a 3D volume, or an image sequence. The pixel values may correspond to light intensity in one or several spectral bands (gray images or color images), but can also be related to various physical measures, such as depth, absorption or reflectance of sonic or electromagnetic waves, or nuclear magnetic resonance.
Pre-processing—Before a computer vision method can be applied to image data in order to extract some specific piece of information, it is usually beneficial to process the data in order to assure that it satisfies certain assumptions implied by the method. Examples of pre-processing include, but are not limited to, re-sampling in order to assure that the image coordinate system is correct, noise reduction in order to assure that sensor noise does not introduce false information, contrast enhancement to assure that relevant information can be detected, and scale space representation to enhance image structures at locally appropriate scales.
Feature extraction—Image features at various levels of complexity are extracted from the image data. Typical examples of such features are: Lines, edges, and ridges; Localized interest points such as corners, blobs, or points; More complex features may be related to texture, shape, or motion.
Detection/segmentation—At some point in the processing a decision may be made about which image points or regions of the image are relevant for further processing. Examples are: Selection of a specific set of interest points; Segmentation of one or multiple image regions that contain a specific object of interest; Segmentation of the image into nested scene architecture comprising foreground, object groups, single objects, or salient object parts (also referred to as spatial-taxon scene hierarchy).
High-level processing—At this step, the input may be a small set of data, for example a set of points or an image region that is assumed to contain a specific object. The remaining processing may comprise, for example: Verification that the data satisfy model-based and application-specific assumptions; Estimation of application-specific parameters, such as object pose or object size; Image recognition—classifying a detected object into different categories; Image registration—comparing and combining two different views of the same object.
Decision making—Making the final decision required for the application, for example match/no-match in recognition applications.
One or more of the present embodiments may include a vision processing unit (not shown separately, but may be a component of the computer vision module 163). A vision processing unit is an emerging class of microprocessor; it is a specific type of AI (artificial intelligence) accelerator designed to accelerate machine vision tasks. Vision processing units are distinct from video processing units (which are specialized for video encoding and decoding) in their suitability for running machine vision algorithms such as convolutional neural networks, SIFT, etc. Vision processing units may include direct interfaces to take data from cameras (bypassing any off-chip buffers), and may have a greater emphasis on on-chip dataflow between many parallel execution units with scratchpad memory, like a many core DSP (digital signal processor). But, like video processing units, vision processing units may have a focus on low precision fixed point arithmetic for image processing.
Some of the present embodiments may use facial recognition hardware and/or software, as a part of the computer vision system. Various types of facial recognition exist, some or all of which may be used in the present embodiments.
Some face recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face. For example, an algorithm may analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for other images with matching features. Other algorithms normalize a gallery of face images and then compress the face data, only saving the data in the image that is useful for face recognition. A probe image is then compared with the face data. One of the earliest successful systems is based on template matching techniques applied to a set of salient facial features, providing a sort of compressed face representation.
Recognition algorithms can be divided into two main approaches, geometric, which looks at distinguishing features, or photometric, which is a statistical approach that distills an image into values and compares the values with templates to eliminate variances.
Popular recognition algorithms include principal component analysis using eigenfaces, linear discriminant analysis, elastic bunch graph matching using the Fisherface algorithm, the hidden Markov model, the multilinear subspace learning using tensor representation, and the neuronal motivated dynamic link matching.
Further, a newly emerging trend, claimed to achieve improved accuracy, is three-dimensional face recognition. This technique uses 3D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin.
One advantage of 3D face recognition is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view. Three-dimensional data points from a face vastly improve the precision of face recognition. 3D research is enhanced by the development of sophisticated sensors that do a better job of capturing 3D face imagery. The sensors work by projecting structured light onto the face. Up to a dozen or more of these image sensors can be placed on the same CMOS chip—each sensor captures a different part of the spectrum.
Another variation is to capture a 3D picture by using three tracking cameras that point at different angles; one camera pointing at the front of the subject, a second one to the side, and a third one at an angle. All these cameras work together to track a subject's face in real time and be able to face detect and recognize.
Another emerging trend uses the visual details of the skin, as captured in standard digital or scanned images. This technique, called skin texture analysis, turns the unique lines, patterns, and spots apparent in a person's skin into a mathematical space.
Another form of taking input data for face recognition is by using thermal cameras, which may only detect the shape of the head and ignore the subject accessories such as glasses, hats, or make up.
Further examples of automatic identification and data capture (AIDC) and/or computer vision that can be used in the present embodiments to verify the identity and/or authorization of a person include, without limitation, biometrics. Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in various forms of identification and access control. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers can be physiological characteristics and/or behavioral characteristics. Physiological characteristics may be related to the shape of the body. Examples include, but are not limited to, fingerprints, palm veins, facial recognition, three-dimensional facial recognition, skin texture analysis, DNA, palm prints, hand geometry, iris recognition, retina recognition, and odor/scent recognition. Behavioral characteristics may be related to the pattern of behavior of a person, including, but not limited to, typing rhythm, gait, and voice recognition.
The present embodiments may use any one, or any combination of more than one, of the foregoing biometrics to identify and/or authenticate a person who is either suspicious or who is authorized to take certain actions with respect to a property or expensive item of collateral. For example, the computer vision module 163, and/or the camera 154 and/or the processor 160 may receive information about the person using any one, or any combination of more than one, of the foregoing biometrics.
In various embodiments, the system 400 may also include one or more second A/V recording and communication devices 412 configured to access a second user's network 418 to connect to the network (Internet/PSTN) 410. The second user's network 418 may include any or all of the components and/or functionality of the user's network 110 described herein. The system 400 may further include one or more second client devices 414, 416, which in various embodiments may be configured to be in network communication with the second A/V recording and communication device 412. The second client devices 414, 416 may comprise, for example, a mobile phone such as a smartphone, or a computing device such as a tablet computer, a laptop computer, a desktop computer, etc. The second client devices 414, 416 may include any or all of the components and/or functionality of the client device 114 and/or the client device 850 described herein. In some embodiments, the second client devices 414, 416 may not be associated with a second A/V recording and communication device 412, as described above. In other words, the user/owner of the second client device(s) 414, 416 may not also use/own a second A/V recording and communication device 412.
With further reference to
In reference to
In further reference to
In the illustrated embodiment of
In some embodiments, the first image data and the second image data may both be received from one camera, such as where a first A/V recording and communication doorbell 130 captures multiple image data of a person.
At block B602 the process analyzes the first image data and the second image data. In some of the present embodiments, the analysis at block B602 may include analyzing the first image data and the second image data to determine the presence of a person. This analysis may include scanning for recognizable features of a person(s) in the image data using the computer vision module 163, image recognition software, and/or other methods as described above, for example.
At block B604, based on the analysis from block B602, the process determines that the first image data includes a first partial facial image of a person and the second image data includes a second partial facial image of the person. In some of the present embodiments, the first partial facial image includes a first portion of the face of the person and the second partial facial image does not include the first portion of the face of the person. In other embodiments, the first partial facial image and the second partial facial image may be different, but each include at least part of the same portion of the face of the person. For example, the first partial facial image may be of a right-side profile of the face of the person and the second partial facial image may be of a front of the face of the person, such that a portion of the right side of the face is included in each of the first and second partial facial images.
In one embodiment, for example, the analysis of the first image data and the second image data yields the determination that a person is present in each of the first image and the second image. For example, from the first image data, it may be determined that a first partial facial image of a right side of the face of a person is present and, from the second image data, it may be determined that a second partial facial image of a left side of a face of a person is present. Biometric data, distinguishing facial features, and/or other known techniques may be used to analyze the first and second partial facial images to make the determination that the first partial facial image and the second partial facial image are of the same person.
At block B606 the process generates a composite facial image of the person based, at least in part, on the first partial facial image and the second partial facial image. The composite facial image of the person is generated from the first partial facial image and the second partial facial image using, for example, facial recognition software, 3D modeling software, image processing software, or other processes currently existing or later invented, including those described above.
At block B608 the process generates and transmits, to a client device, a user alert including the composite facial image. The user alert and the composite facial image may be transmitted over the user's network 110 and/or the network 112. The client device, such as the user's client device 114, may be associated with one of the A/V recording and communication doorbells 130, for example, or may be part of a community of networked client devices configured to receive alerts. The composite facial image may then be displayed on a display of the client device. In addition to the composite facial image and the user alert, video, still image, and/or audio information along with the first and/or second image data may also be generated and/or transmitted to the client device.
The process of
One embodiment includes two or more A/V recording and communication doorbells 130 (or similar A/V recording and communication devices) associated with one client device and located at one address, such as at one home, business, park, or the like. Each of the two or more A/V recording and communication doorbells 130 may include at least one camera 154. In addition, the two or more A/V recording and communication doorbells may include at least one motion sensor, such as the PIRs 344 of
In an embodiment in which two doorbells 130 (or other types of A/V recording and communication devices) are located at a same property or address, at least a first camera 154 of a first A/V recording and communication doorbell 130 generates first image data in response to a first motion event and a second camera 154 of a second A/V recording and communication doorbell 130 generates second image data in response to a second motion event at the property or address. The first motion event and the second motion event may be related, such as where a person walks past a front door at the property where the first A/V recording and communication doorbell 130 is located and then proceeds to walk past the garage where the second A/V recording and communication doorbell 130 is located. In other embodiments, the first motion event and the second motion event may be unrelated, such as where a person approaches a front door where the first A/V recording and communication doorbell 130 is located and at another day and/or time approaches a back door where the second A/V recording and communication doorbell 130 is located.
Although the present embodiment discusses only first and second image data generated by the cameras 154, this embodiment is not intended to be limiting. In other embodiments, any number of cameras 154 associated with any number of A/V recording and communication doorbells 130 may generate any number of image data in response to any number of motion events. For example, a camera 154 of only one A/V recording and communication doorbell 130 may capture both the first image data and the second image data. In another example, more than two A/V recording and communication doorbells 130 may capture first, second, and third image data to be used in generating the composite facial image.
With reference to
After receiving the image data, the first image data and the second image data (and any additional image data received) is analyzed, at block B602. The analysis may be carried out by facial recognition software (or other biometric analysis software), facial feature and characteristic analysis, and other types of facial recognition described herein and/or later developed. In some of the present embodiments, the first part of the analysis at block B602 may be to determine the presence of one or more people in each of the first image data and the second image data. Once it is determined that one or more people are present, the first image data and the second image data may then be analyzed to retrieve facial images.
In some of the present embodiments, the facial images captured may be sufficient for determining appearance and identity without any further processing. In such embodiments, the facial images may be transmitted to the display of the client device for viewing by the user of the client device.
However, as described above, sometimes only partial facial images are retrieved from image data, and thus further processing may be performed in order to generate a more complete facial image that is more useful for appearance and identity recognition. In situations such as this, the facial images may only be partial facial images that may or may not be sufficient for determining appearance or identity. In such embodiments, the partial facial images may be analyzed, such as by comparing the partial facial images to one another to determine if the partial facial images are of the same person. Based on this analysis, it may be determined that the first partial facial image from the first image data and the second partial facial image from the second image data are of the same person, at block B604. The determination that the partial facial images are of the same person may be done by comparing, for example, distinguishable facial features, by comparing biometric data, and/or by analyzing non-facial features and/or characteristics such as clothing, jewelry, headwear, hair and/or skin color, body movements including cadence, stride, arm sway, and posture, or any other distinguishing non-facial features and characteristics of the person.
With further reference to
For example, if multiple partial facial images are analyzed of the person, they may initially be sorted by the portions of the face present in each of the partial facial images, such as left side profile, right side profile, front view, rear view, etc. After the multiple partial facial images are sorted by portions of the face, the partial facial images may then be sorted by image quality, with the highest quality facial images for each portion of the face being selected for inclusion in the composite facial image generation. In some embodiments, prior to any sorting, one step may be to remove any partial facial images that are of too poor quality to be used for any facial recognition analysis or composite facial image generation.
Once the multiple partial facial images are sorted and the best quality partial facial images are selected, the partial facial images to be used may be selected. For example, it may be preferable to have a partial facial image of a left side profile and a partial facial image of a right-side profile of the person in order to generate a more accurate and/or complete composite facial image. In such an example, the best quality left side profile and best quality right side profile images may be selected.
Once the selection is made, the composite facial image may be generated. In some of the present embodiments, the composite facial image may be a front view of the face of the person generated based on the partial facial images. In other embodiments, the composite facial image may be a three-dimensional (3D) view of the face and head of the person. In such embodiments, the composite facial image may be programmed to be freely rotatable by the user of the client device such that the user can interact with the composite facial image by rotating the composite facial image for viewing from different angles. This rotatability of the composite facial image may aid the user in identifying the person.
In some embodiments, the composite facial image may be rotatable by 360° about a vertical axis and/or rotatable about more than one axis, while in other embodiments the composite facial image may be rotatable by an angle less than 360°. In some embodiments, the angle less than 360° may be determined by the sufficiency of the partial facial images used to generate the composite facial image. For example, if one or more portions of the head and/or face of the person are not captured in the partial facial images (“undefined” portions), then the composite facial image may not be rotatable by an angle that would make the undefined portions of the head and/or face visible.
With further reference to
In some embodiments, the video footage may also be streamed live to the client device. In such embodiments, processes described herein may take place concurrently with the transmitting of the live video. For example, the motion sensors and/or the first camera of the first A/V recording and communication doorbell may detect a motion event, begin recording live video, and also begin transmitting the live video to the client device associated with the first A/V recording and communication device. As such, at this time, the user is able to view the live video footage on a display of their client device. While the live video is being transmitted to the client device, the analysis of the image data based on the live video may be taking place, at block B602. Based on the analysis, once it is determined that the first partial facial image and the second partial facial image are of the same person at block B604, and the composite facial image is generated at block B606, the composite facial image may be transmitted to the client device, at block B608, to be displayed alongside, overlaid on, or accessed separately from, the live video footage.
This process not only allows the user of the client device to view the motion event as it is taking place, but also to receive more detailed information in the form of a composite facial image in real time while viewing the motion event. Using this process enables the user of the client device to more accurately, effectively, and efficiently identify not only suspicious activity, but also suspicious persons, and to take the appropriate action such as alerting neighbors, law enforcement, family member(s), and the like.
In addition, enabling the user of the client device to view the composite facial image may aid the user in avoiding false positives for suspicious activity and/or persons. For example, the user of the client device may believe that the person is a suspicious person based on the activity and/or the partial facial image in their video footage, but upon receiving the composite facial image, may realize that the person is an authorized person, such as a neighbor, a relative, etc.
The processes described herein may include additional processing after generation of the composite facial image at block B606. For example, facial recognition software may be used to compare facial features of the person in the image(s) based on the composite facial image to a database of known suspicious persons, such as a criminal database and/or a “most wanted” database. This comparison may be performed using any of the facial recognition algorithms described above, or later developed. Upon a determination that the person is in the database of suspicious persons, a warning flag may be set, and/or the user alert transmitted to the client device may also include information about the suspicious person. The facial recognition software may also use biometric information, and/or distinguishing facial features, as described above.
The database of known suspicious persons may be resident on the A/V recording and communication doorbell 130 or on the client device, but more commonly will be located on a server and accessed through an API. The database may contain as much information as possible about each known suspicious person, such as their facial features or characteristics, name, aliases, and/or criminal history. However, the database may also contain as little information as an image of the face of a known suspicious person, even if that person is otherwise unidentified by name or other typical identifying information. In one embodiment, the database of known suspicious persons is a database of convicted felons and/or registered sex offenders. In another embodiment, the database of known suspicious persons may be modified by the user, such as through the client device. Specifically, the user may, upon review of stored composite facial images of visitors, or upon a request to identify the person in the composite facial image as suspicious or authorized, flag a particular stored image of a visitor as suspicious. This composite facial image may then be uploaded into the database. This flagging function can further be notated by the user as a “public” suspicious person, who might be exhibiting suspicious behavior as to an entire neighborhood, such as, for example, a suspicious person that the user saw breaking a neighbor's windows, or it can be notated by the user as a “private” suspicious person, such as, for example a hostile co-worker whose presence may be suspicious with respect to the user's home, but not to the public at large. Additionally, a user may upload one or more images of persons that the user considers suspicious into the database, from sources other than those captured by the A/V recording and communication doorbell 130, e.g., from the user's smartphone camera. This example embodiment allows for the user to receive alerts about persons that are suspicious to the user, for example, an ex-spouse, a hostile co-worker, a hostile neighbor, etc., but who are not otherwise known to be suspicious to society at large.
In some of the present embodiments, the user of the client device may also be able to flag visitors, based on the composite facial image, as authorized users. In such embodiments, the person may be added to a database of authorized persons. As such, for example, if an authorized person visits again, a user alert is not generated and transmitted to the client device because the person has been deemed authorized. However, even though a user alert may not be transmitted to the client device, a record of the visit of the authorized person may still be saved for later access by the user of the client device.
In another embodiment, the process determines if the person that is in the field of view of the camera 154 of the A/V recording and communication doorbell 130 is exhibiting suspicious behavior. This determination can be performed either at the same time as, before, or after the determination is made as to whether the person can be identified as a suspicious person using one or more database searches. Similar to the recognition of suspicious person described above, the recognition of suspicious behaviors may be accomplished using algorithms (calculating loitering time, etc.) and comparisons to databases of suspicious activities (concealing objects, running, crouching, etc.).
Again, this additional processing of comparing the composite facial images to databases of suspicious and/or authorized persons provides another level of security to the user of the client device. For example, the user may believe that the person in the composite facial image is not recognizable, but maybe doesn't believe them to be suspicious, so they disregard the person as someone who had the wrong address, or was going door to door, or another seemingly harmless act. However, by comparing the composite facial image to a database of suspicious persons, the user of the client device may receive another layer of information about the person that may enable them to make a more educated decision as to whether or not to pursue law enforcement help, report the incident to their landlord, share the information with their neighborhood, etc. Ultimately, without receiving the composite facial image, the user of the client device may have never been able to fully ascertain the appearance of the person captured in the image data, and even more, without the comparison of the composite facial image to the database of suspicious persons, the user may never have realized that this person was potentially dangerous or had been flagged by others in the surrounding area as a person of interest or suspicion.
At block B612, the process receives a request from a first client device to provide an alert and to transmit the first image data to at least one second client device. For example, assuming that the first A/V recording and communication doorbell 130 is associated with the first client device and the second A/V recording and communication doorbell 130 is associated with a second client device, a request is received, over the user's network 110 and/or the network 112, from the first client device to provide an alert to at least the second client device, and/or to transmit the first image data to at least the second client device.
At block B614, in response to receiving the request, the process analyzes the first image data and the second image data. For example, the first image data from the first camera 154 of the first A/V recording and communication doorbell 130 associated with the first client device and the second image data from the second camera 154 of the second A/V recording and communication doorbell 130 associated with the second client device are analyzed, similar to the process described above with respect to
At block B616, based on the analysis, the process determines that the first image data includes a first partial facial image and the second image data includes a second partial facial image of the person, similar to block B604 of
The process of
In one embodiment of the process of
In this embodiment, a first motion event may be captured by the first camera 154 and first image data may be generated by the first camera 154 of the first A/V recording and communication doorbell 130, and a second motion event may be captured by the second camera 154 and second image data may be generated by the second camera 154 of the second A/V recording and communication doorbell 130. As an example, the first A/V recording and communication doorbell 130 may be located at the front door of a first address, and the first motion event may be captured in response to a person approaching the front door. The second A/V recording and communication doorbell 130 may be located at the front door of a second address, and the second motion event may be captured in response to a person approaching the front door. In response to the motion events, and the generation of the first image data and the second image data, the first image data and the second image data are received at block B610.
The user of the first client device may review the video and/or still image(s) recorded by the first A/V recording and communication doorbell in response to the first motion event and determine that a person is present, but the appearance of the person is not discernible because only a portion of the person's face is visible. As a result, the user of the first client device may request to share the first image data and to provide an alert to at least the second client device at block B612. For example, the user of the first client device may wish to share the first image data with the second client device, where the second client device is associated with the second A/V recording and communication doorbell which is located in the same neighborhood as the first A/V recording and communication doorbell (e.g., at a neighbor's house, down the street, or within a predetermined radius of the first A/V recording and communication doorbell 130). This sharing may be done in hopes of gaining a composite facial image of the person who triggered the first motion event, or may be done without knowledge that gaining a composite facial image is possible. At block B612, the request is received from the first client device to provide an alert and to transmit the first image data to at least the second client device.
In some of the present embodiments, the user of the first client device may make the determination of which client device(s) will receive the user alert(s) and the first image data. The client devices may each be associated with at least one other A/V recording and communication doorbell 130. For example, the user may share with a specific client device or with all client devices within a specific radius, neighborhood, city, or the like. In some of the present embodiments, the user may be able to make a selection by drawing (e.g., circle, free-hand, etc.) a zone on a map, for example, on the display of the first client device. As such, the user alert and first image data may be shared with all client devices associated with each of the A/V recording and communication doorbells 130 in the zone. In other embodiments, the user may be able set a radius in which to share the user alerts and the first motion data. For example, the user may be able to manipulate a tool on the display of the first client device (e.g., a slider, a scale, etc.) for enlarging or shrinking the radius of a circle surrounding the address of the A/V recording and communication doorbell 130 associated with the first client device.
In other embodiments, the determination of which client devices will receive the user alert(s) and the first image data may be made without user input. For example, this determination may be made based on location and/or time. For example, it may be determined that the user alert and the first image data should be shared with devices within a predetermined radius of the first A/V recording and communication doorbell 130. Example, and non-limiting, values for the predetermined radius may be a quarter of a mile, half a mile, a mile, two miles, or ten miles. In some of the present embodiments, neighborhood, town, city, or other boundaries may be preset such that the user alert and the first image data are shared with the neighborhood, town, city, etc. in which the A/V recording and communication doorbell 130 associated with the client device of the user is located.
In any embodiment, once the request to provide the user alert and transmit the first image data is received, the user alert and the first image data may be transmitted to each of the client devices associated with the A/V recording and communication doorbells 130 in the specified regions (e.g., neighborhood, drawn area, radius, etc.).
As mentioned above, a temporal element may also be considered when determining which of the client devices will receive the user alert and the first image data. For example, if within the specified region there are forty A/V recording and communication doorbells, the alert and the first image data may only be transmitted to the A/V recording and communication doorbells 130 that registered a motion event within a specified time of the first motion event captured by the first A/V recording and communication doorbell 130. Example, and non-limiting, times for the specified times are 10 seconds, 30 seconds, 2 minutes, or 10 minutes. In some of the present embodiments, the specified time may be set by the user of the first client device.
Following the process of
At block B614, in response to receiving the request, the process analyzes the first image data and the second image data. As such, using the received first image data and second image data received at block B610, and in response to receiving the request to transmit the first image data to the second client device at block B612, the process analyzes the first image data and the second image data.
Based on the analysis, at block B616, the process determines that the first image data includes a first partial facial image of a person and the second image data includes a second partial facial image of the person. This determination, similar to that described above with respect to block B604 of
For example, the person may have walked past the first front door in front of the first A/V recording and communication doorbell 130 such that a left side of their face was captured by the first camera 154. The person may have also walked a different direction past the second front door in front of the second A/V recording and communication doorbell 130 such that a right side of their face was captured by the second camera 154. At block B616, the determination is made based on the two partial facial images that the person in the first image data and the second image data is the same person.
At block B618, the process generates a composite facial image, based at least in part on the first partial facial image and the second partial facial image. Block B618 may be completed similar to that described above with respect to block B606 of
At block B620, the process generates and transmits to at least one second client device an alert including the first image data and the composite facial image. As such, the process receives the alert including the first image data and the composite facial image and transmits at least the composite facial image to the second client device associated with the second A/V recording and communication doorbell 130. This way, when viewing the video footage of the second motion event, the user of the second client device can not only see the activity of the person of in the video, but also more clearly see who the person is from the composite facial image. This functionality provides an additional layer of security for the user of the second client device. In addition, the composite facial image may also be transmitted to the first client device so that the user of the first client device can now more clearly determine the appearance and/or identity of the person in the video captured by the first camera 154.
In the present embodiments, by sharing image data, members of common communities, neighborhoods, and other location-bound regions can help one another to more accurately and effectively identify persons. For example, without the process of
In response to a first motion event, the process, at block B624, receives first image data from a first camera of the first A/V recording and communication device. For example, in response to a person entering the field of view of the first camera 154 of the first A/V recording and communication doorbell 130, the first image data generated by the camera 154 is received over the user's network 110 and/or the network 112.
In response to a second motion event, the process, at block B626, receives second image data from a second camera of a second one of the A/V recording and communication devices, the second A/V recording and communication device associated with a second client device. For example, in response to a person entering the field of view of the camera 154 of the second A/V recording and communication doorbell 130, the second image data generated by the second camera 154 is received over the user's network 110 and/or the network 112.
In response to receiving the neighborhood join request, the process, at block B628, determines that the first motion event and the second motion event satisfy a predetermined relationship. For example, the predetermined relationship may be a location-based and/or time-based relationship. As such, the process compares the first motion event and the second motion event to the predetermined relationship. The information about the first motion event and the second motion event may be stored in the image data. The information may be stored in the image data as metadata, for example, such as in the form of location metadata from a global positional system (GPS) or Wi-Fi positioning system (WPS) and/or time metadata from a clock of the A/V recording and communication doorbell 130. As such, the information from both the first motion event and second motion event are compared to one another in view of the predetermined relationship.
If the predetermined relationship is location based, the location may be determined similarly as described above with respect to
In addition to the location-based predetermined relationships, time-based relationships may also be implemented. In some of the present embodiments, the time-based predetermined relationships may be a time gap between the first and second motion events. Example, and non-limiting, time gaps may be one minute, two minutes, five minutes, or ten minutes. As such, the time of the first and second motion events may be compared to determine if they occurred within the predetermined time gap. In such an embodiment, if the first motion event and the second motion event occur within the predetermined time gap, the user alert and the first image data may be transmitted to the client devices associated with the A/V recording and communication doorbells 130 that captured the motion events.
In some of the present embodiments, the time-based predetermined relationships may add an additional layer to the predetermined relationship on top of the location-based predetermined relationships. For example, in some of the present embodiments, a time-based and location-based predetermined relationship may be implemented. In such an embodiment, for example, the first motion event and the second motion event must occur within a predetermined proximity and within a predetermined time gap of one another. In such an embodiment, if both the time- and location-based predetermined relationships are satisfied, the user alert and the first image data may be transmitted to the client devices associated with the A/V recording and communication doorbells 130 that captured the motion events.
With reference to
Based on the analyzing, the process, at block B632, determines that the first image data includes a first partial facial image of a person and the second image data includes a second partial facial image of the person. This determination may be similar to that described above at block B604 of
The process continues at block B634 with generating a composite facial image of the person based, at least in part, on the first partial facial image and the second partial facial image. Again, this process may be similar to that of block B606 of
At block B620, the process generates and transmits, to at least one second client device, an alert including the first image data and the composite facial image. For example, a user alert may be generated and transmitted to the second client device associated with the second A/V recording and communication doorbell 130 over the network 112. In some of the present embodiments, in addition to the second A/V recording and communication doorbell 130, the user alert and the composite facial image may be sent to each other client device associated with each other A/V recording and communication doorbell 130 that also transmitted a neighborhood join request and/or captured a motion event that satisfies the predetermined relationship described above.
In other embodiments, client devices not associated with an A/V recording and communication doorbell 130 and/or not satisfying the predetermined relationship may also receive the user alert and the composite facial image. In this way, users of client devices within a certain geographic zone, such as a neighborhood, who may not currently have an A/V recording and communication device, can also receive alerts and composite facial images of persons who may be suspicious. For example, residents of a neighborhood may be able to download an application onto their client devices, and the user alerts and composite facial images may be shared on the application to residents who live within the neighborhood, or within a predetermined proximity of the A/V recording and communication doorbell 130 that captured the motion event including the partial facial image. These embodiments allow for a wider range of information sharing, which ultimately leads to better informed and safer communities.
In some of the present embodiments, the process of
In some of the present embodiments, similar to that described above with reference to
In some of the present embodiments, once it is determined that the person is a suspicious person, an alert may be automatically sent to law enforcement. For example, the partial facial images may be captured at several houses within a neighborhood in response to motion events at each of the houses. The partial facial images may then be analyzed to determine the person in the partial facial images is the same person, and in response, a composite facial image may be generated. The composite facial image may then be compared against databases of suspicious persons, including, for example, a database of prior criminals. In response to comparing the composite facial image to the database of prior criminals, it may be determined that the person is a prior criminal. In response, the composite facial image and an alert may be transmitted to a law enforcement agency, who can then make their own determination of whether action is required, such as dispatching police to the neighborhood, for example.
Using the process of
In each of the processes of
The logos, artwork, designs, etc. may also be used to help determine authorized persons. For example, a mailman (letter carrier) may have been the cause of several motion events where image data was generated by the cameras 154 that included partial facial images of the mailman. The mailman may have the logo of the postal service on his or her uniform, for example, and the image data may be analyzed to determine the presence of this logo. In response, the processes may determine that the mailman is an authorized person or is likely to be an authorized person. In response, in some of the present embodiments, in addition to the user alert and the composite facial image, the process may also transmit the postal service logo and/or information about the logo, such as “This person may be the mailman based on the postal service logo on his or her uniform,” for example. The users of the client devices that receive this information may then be able to determine and share the determination that the person is the mailman, an authorized person, and/or a suspicious person. In response, the user feedback may be received, and the mailman may be added to a corresponding database, such as a database of suspicious persons or a database of authorized persons.
In some implementations, a query may be transmitted to the client devices that are associated with the A/V recording and communication doorbells 130 that generated the image data including the partial facial images of the mailman. The query may include a question as to whether the mailman is the mailman, an authorized user, and/or a suspicious person. For example, along with the composite facial image, the user alert, and/or the information about the mailman, the users of the client devices may receive a question, or series of questions, such as, “Is this person the mailman? If so, add this person to the database of authorized persons? If not, add this person to the database of suspicious persons?” In response, the process receives the query feedback from the client devices and responds accordingly by, for example, adding the mailman to the database of authorized persons.
This process again allows for the users of the client devices to make more informed decisions by not only being able to view composite images of the persons in their video footage, but also to view the composite image in addition to identifying information about the person's clothing. Without having the composite image and the identifying information, such as the postal service logo, the user of the client device may believe the person in the video footage is a suspicious person when in fact it is the mailman.
As described with reference to various embodiments herein, a user alert may be generated. In some embodiments, the alert may comprise an alert signal sent to a client device. For example, the alert may include audio and/or video data being transmitted (streamed) from the A/V recording and communication doorbell 130 to the user's client device 114 via the user's network 110 and/or the network 112. The streaming video may include the composite image of the person in the video. The user can then determine whether to take further action, such as alerting law enforcement and/or sharing the video footage with other people, such as via social media.
In some embodiments, the alert may comprise an audible alarm emitted from the speaker 152 of the A/V recording and communication doorbell 130. The audible alarm may be any loud noise likely to attract attention and/or startle a suspicious person, making it more likely that he or she will flee without engaging in further suspicious or criminal behavior. In some embodiments, the alert may comprise an announcement emitted from the speaker 152 of the A/V recording and communication doorbell 130. The announcement may comprise a verbal warning that the area about the A/V recording and communication doorbell 130 is being recorded. In some of the present embodiments, the alert may comprise both an audible alarm and an announcement in combination. Also, in some of the present embodiments, the alert may comprise any combination of an alert signal sent to a client device, an audible alarm emitted from the speaker 152 of the A/V recording and communication doorbell 130, and an announcement emitted from the speaker 152 of the A/V recording and communication doorbell 130.
In any of the present embodiments, various aspects of methods may be performed locally, e.g. by one or more components of the A/V recording and communication doorbell 130, and/or remotely, e.g. by one or more network devices, such as the server 118 and/or the backend API 120, for example. For example, the processor 160 of the A/V recording and communication doorbell 130 may perform various aspects such as, but not limited to, analyzing the first partial facial image and the second partial facial image to determine that the person in the first partial facial image and the person in the second partial facial image is the same person.
As discussed above, the present disclosure provides numerous examples of methods and systems including A/V recording and communication doorbells, but the present embodiments are equally applicable for A/V recording and communication devices other than doorbells. For example, the present embodiments may include one or more A/V recording and communication security cameras instead of, or in addition to, one or more A/V recording and communication doorbells. An example A/V recording and communication security camera may include substantially all of the structure and functionality of the doorbell 130, but without the front button 148, the button actuator 228, and/or the light pipe 232.
With reference to
The memory 804 may include both operating memory, such as random-access memory (RAM), as well as data storage, such as read-only memory (ROM), hard drives, flash memory, or any other suitable memory/storage element. The memory 804 may include removable memory elements, such as a CompactFlash card, a MultiMediaCard (MMC), and/or a Secure Digital (SD) card. In some of the present embodiments, the memory 804 may comprise a combination of magnetic, optical, and/or semiconductor memory, and may include, for example, RAM, ROM, flash drive, and/or a hard disk or drive. The processor 802 and the memory 804 each may be, for example, located entirely within a single device, or may be connected to each other by a communication medium, such as a USB port, a serial port cable, a coaxial cable, an Ethernet-type cable, a telephone line, a radio frequency transceiver, or other similar wireless or wired medium or combination of the foregoing. For example, the processor 802 may be connected to the memory 804 via the dataport 810.
The user interface 806 may include any user interface or presentation elements suitable for a smartphone and/or a portable computing device, such as a keypad, a display screen, a touchscreen, a microphone, and a speaker. The communication module 808 is configured to handle communication links between the client device 800 and other, external devices or receivers, and to route incoming/outgoing data appropriately. For example, inbound data from the dataport 810 may be routed through the communication module 808 before being directed to the processor 802, and outbound data from the processor 802 may be routed through the communication module 808 before being directed to the dataport 810. The communication module 808 may include one or more transceiver modules capable of transmitting and receiving data, and using, for example, one or more protocols and/or technologies, such as GSM, UMTS (3GSM), IS-95 (CDMA one), IS-2000 (CDMA 2000), LTE, FDMA, TDMA, W-CDMA, CDMA, OFDMA, Wi-Fi, WiMAX, or any other protocol and/or technology.
The dataport 810 may be any type of connector used for physically interfacing with a smartphone and/or a portable computing device, such as a mini-USB port or an IPHONE®/IPOD® 30-pin connector or LIGHTNING® connector. In other embodiments, the dataport 810 may include multiple communication channels for simultaneous communication with, for example, other processors, servers, and/or client terminals.
The memory 804 may store instructions for communicating with other systems, such as a computer. The memory 804 may store, for example, a program (e.g., computer program code) adapted to direct the processor 802 in accordance with the present embodiments. The instructions also may include program elements, such as an operating system. While execution of sequences of instructions in the program causes the processor 802 to perform the process steps described herein, hard-wired circuitry may be used in place of, or in combination with, software/firmware instructions for implementation of the processes of the present embodiments. Thus, the present embodiments are not limited to any specific combination of hardware and software.
The computer system 900 may include at least one processor 910, memory 920, at least one storage device 930, and input/output (I/O) devices 940. Some or all of the components 910, 920, 930, 940 may be interconnected via a system bus 950. The processor 910 may be single- or multi-threaded and may have one or more cores. The processor 910 may execute instructions, such as those stored in the memory 920 and/or in the storage device 930. Information may be received and output using one or more I/O devices 940.
The memory 920 may store information, and may be a computer-readable medium, such as volatile or non-volatile memory. The storage device(s) 930 may provide storage for the system 900, and may be a computer-readable medium. In various aspects, the storage device(s) 930 may be a flash memory device, a hard disk device, an optical disk device, a tape device, or any other type of storage device.
The I/O devices 940 may provide input/output operations for the system 900. The I/O devices 940 may include a keyboard, a pointing device, and/or a microphone. The I/O devices 940 may further include a display unit for displaying graphical user interfaces, a speaker, and/or a printer. External data may be stored in one or more accessible external databases 960.
The features of the present embodiments described herein may be implemented in digital electronic circuitry, and/or in computer hardware, firmware, software, and/or in combinations thereof. Features of the present embodiments may be implemented in a computer program product tangibly embodied in an information carrier, such as a machine-readable storage device, and/or in a propagated signal, for execution by a programmable processor. Embodiments of the present method steps may be performed by a programmable processor executing a program of instructions to perform functions of the described implementations by operating on input data and generating output.
The features of the present embodiments described herein may be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and/or instructions from, and to transmit data and/or instructions to, a data storage system, at least one input device, and at least one output device. A computer program may include a set of instructions that may be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result. A computer program may be written in any form of programming language, including compiled or interpreted languages, and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
Suitable processors for the execution of a program of instructions may include, for example, both general and special purpose processors, and/or the sole processor or one of multiple processors of any kind of computer. Generally, a processor may receive instructions and/or data from a read only memory (ROM), or a random-access memory (RAM), or both. Such a computer may include a processor for executing instructions and one or more memories for storing instructions and/or data.
Generally, a computer may also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files. Such devices include magnetic disks, such as internal hard disks and/or removable disks, magneto-optical disks, and/or optical disks. Storage devices suitable for tangibly embodying computer program instructions and/or data may include all forms of non-volatile memory, including for example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices, magnetic disks such as internal hard disks and removable disks, magneto-optical disks, and CD-ROM and DVD-ROM disks. The processor and the memory may be supplemented by, or incorporated in, one or more ASICs (application-specific integrated circuits).
To provide for interaction with a user, the features of the present embodiments may be implemented on a computer having a display device, such as an LCD (liquid crystal display) monitor, for displaying information to the user. The computer may further include a keyboard, a pointing device, such as a mouse or a trackball, and/or a touchscreen by which the user may provide input to the computer.
The features of the present embodiments may be implemented in a computer system that includes a back-end component, such as a data server, and/or that includes a middleware component, such as an application server or an Internet server, and/or that includes a front-end component, such as a client computer having a graphical user interface (GUI) and/or an Internet browser, or any combination of these. The components of the system may be connected by any form or medium of digital data communication, such as a communication network. Examples of communication networks may include, for example, a LA/V (local area network), a WA/V (wide area network), and/or the computers and networks forming the Internet.
The computer system may include clients and servers. A client and server may be remote from each other and interact through a network, such as those described herein. The relationship of client and server may arise by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
As used herein, the phrases “at least one of A, B and C,” “at least one of A, B, or C,” and “A, B, and/or C” are synonymous and mean logical “OR” in the computer science sense. Thus, each of the foregoing phrases should be understood to read on (A), (B), (C), (A and B), (A and C), (B and C), and (A and B and C), where A, B, and C are variables representing elements or features of the claim. Also, while these examples are described with three variables (A, B, C) for ease of understanding, the same interpretation applies to similar phrases in these formats with any number of two or more variables.
The above description presents the best mode contemplated for carrying out the present embodiments, and of the manner and process of practicing them, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which they pertain to practice these embodiments. The present embodiments are, however, susceptible to modifications and alternate constructions from those discussed above that are fully equivalent. Consequently, the present invention is not limited to the particular embodiments disclosed. On the contrary, the present invention covers all modifications and alternate constructions coming within the spirit and scope of the present disclosure. For example, the steps in the processes described herein need not be performed in the same order as they have been presented, and may be performed in any order(s). Further, steps that have been presented as being performed separately may in alternative embodiments be performed concurrently. Likewise, steps that have been presented as being performed concurrently may in alternative embodiments be performed separately.
Claims
1. A method comprising:
- receiving, from a first audio/video (A/V) recording and communication device at a first location, first image data representative of a first field of view of a first camera of the first A/V recording and communication device;
- receiving, from a second A/V recording and communication device at a second location, second image data representative of a second field of view of a second camera of the second A/V recording and communication device;
- analyzing the first image data;
- based at least in part on the analyzing the first image data, determining that the first image data depicts a first person within the first field of view;
- analyzing the second image data;
- based at least in part on the analyzing the second image data, determining that the second image data depicts a second person within the second field of view;
- determining that the first person and the second person are a same person;
- based at least in part on the first image data, generating a first facial image of the same person;
- based at least in part on the second image data, generating a second facial image of the same person;
- based at least in part on the first facial image and the second facial image, generating a composite facial image, wherein the composite facial image is a three-dimensional representation of at least a portion of the first facial image and at least a portion of the second facial image;
- generating a user alert including the composite facial image representative of the first facial image and the second facial image; and
- transmitting, to a client device, the user alert.
2. The method of claim 1, wherein:
- the first A/V recording and communication device and the second A/V recording and communication device are associated with the client device; and
- the first location and the second location are at a same physical address.
3. The method of claim 1, wherein:
- the first A/V recording and communication device is associated with the client device;
- the second A/V recording and communication device is associated with another client device;
- the first location is at a first physical address; and
- the second location is at a second physical address different from the first physical address.
4. The method of claim 1, further comprising:
- comparing at least one of the first facial image or the second facial image to a database;
- based at least in part on the comparing, determining that the same person is a person of interest; and
- retrieving information about the same person from the database,
- wherein the user alert further includes data representative of the information.
5. The method of claim 1, further comprising:
- transmitting, to the client device, first data representative of a request, the request for determining that the same person is one of authorized or unauthorized;
- based at least in part on the request, receiving, from the client device, second data representative of a response to the request;
- analyzing the second data;
- based at least in part on the analyzing the second data: when the response is indicative of the same person being authorized, adding the same person to a first database; and when the response is indicative of the same person being unauthorized, adding the same person to at least one of the first database or a second database.
6. The method of claim 1, wherein the determining that the first person and the second person are the same person comprises:
- identifying first features of the first person from the first image data;
- identifying second features of the second person from the second image data;
- comparing the first features to the second features; and
- determining, based at least in part on the comparing, that the first person and the second person are the same person.
7. The method of claim 6, wherein the features include at least one of facial features, clothing features, or movement features.
8. The method of claim 1, wherein the client device comprises at least one of a first client device or a second client device, the method further comprising:
- receiving, from the first client device associated with the first A/V recording and communication device, a first join request for a network, the first A/V recording and communication device being associated with a first user; and
- receiving, from the second client device associated with the second A/V recording and communication device, a second join request for the network, the second A/V recording and communication device being associated with a second user.
9. The method of claim 8, wherein the transmitting the user alert includes transmitting the user alert to the first client device, the method further comprising:
- transmitting, to the first client device, first data representative of a query, the query for determining whether the person is a person of interest;
- receiving, from the first client device, second data representative of a response to the query, the response indicative that the person is a person of interest;
- based at least in part on the second data representative of the response to the query, generating an additional alert including third data representative of the person and at least one of the first image, the second image, the first image data, or the second image data; and
- transmitting the additional alert to a plurality of other client devices associated with a geographical area of the first A/V recording and communication device or the second A/V recording and communication device.
10. The method of claim 1, wherein the determining that the first person and the second person are the same person further comprises determining:
- a proximity relationship between the first location of the first A/V recording and communication device and the second location of the second A/V recording and communication device; or
- a temporal relationship between: a first time at which the first person was determined to be within the first field of view of the first A/V recording and communication device, and a second time at which the second person was determined to be within the second field of view of the second A/V recording and communication device.
11. A method comprising:
- receiving, from a first audio/video (A/V) recording and communication device, first image data representative of a first motion event;
- receiving, from a second A/V recording and communication device, second image data representative of a second motion event;
- determining that the first motion event and the second motion event satisfy a relationship, wherein the relationship includes a proximity relationship between a first location of the first A/V recording and communication device and a second location of the second A/V recording and communication device;
- generating a first image of a first person from the first image data;
- generating a second image of a second person from the second image data;
- based at least in part on the first motion event and the second motion event satisfying the relationship, generating a user alert including data representative of the first image and the second image; and
- transmitting, to a client device, the user alert.
12. The method of claim 11, wherein:
- the first A/V recording and communication device and the second A/V recording and communication device are associated with the client device; and
- the first A/V recording and communication device and the second A/V recording and communication are located at a same physical address.
13. The method of claim 11, wherein:
- the first A/V recording and communication device is associated with the client device;
- the second A/V recording and communication device is associated with another client device;
- the first A/V recording and communication device is installed at a first physical address; and
- the second A/V recording and communication device is installed at a second physical address different from the first physical address.
14. The method of claim 11, further comprising:
- determining that the first person and the second person are a same person,
- wherein the generating the user alert is based at least in part on the first person and the second person being the same person.
15. The method of claim 11, wherein the relationship includes:
- a temporal relationship between a first time of the first motion event and a second time of the second motion event.
16. The method of claim 11, further comprising:
- comparing at least one of the first image or the second image to a database;
- based at least in part on the comparing, determining that at least one of the first person or the second person is a person of interest; and
- retrieving information about the person of interest from the database,
- wherein the user alert further includes additional data representative of the information.
17. The method of claim 11, wherein the data is first data, and the method further comprising:
- transmitting, to the client device, second data representative of a query, the query for determining whether at least one of the first person or the second person is one of authorized or unauthorized;
- receiving, from the client device, third data representative of a response to the query;
- analyzing the third data;
- based at least in part on the analyzing the third data: when the response is indicative of at least one of the first person or the second person being authorized, adding the at least one of the first person or the second person to a first database; and when the response is indicative of at least one of the first person or the second person being unauthorized, adding the at least one of the first person or the second person to at least one of the first database or a second database.
18. The method of claim 17, further comprising:
- comparing the composite facial image to a database of persons of interest;
- based on the comparing, determining that the person is a person of interest;
- based on the determining that the person is a person of interest, retrieving information about the person from the database; and
- transmitting the retrieved information with the user alert including the composite facial image.
19. The method of claim 11, further comprising:
- based at least in part on the first image and the second image, generating a composite facial image,
- wherein the data representative of the first image and the second image comprises data representative of the composite facial image.
20. The method of claim 11, wherein the first image data representative of the first motion event comprises at least one image captured by a camera of the first A/V recording and communication device upon detecting motion within a field of view of the camera.
4764953 | August 16, 1988 | Chern et al. |
5428388 | June 27, 1995 | von Bauer et al. |
5760848 | June 2, 1998 | Cho |
6072402 | June 6, 2000 | Kniffin et al. |
6192257 | February 20, 2001 | Ray |
6271752 | August 7, 2001 | Vaios |
6429893 | August 6, 2002 | Xin |
6456322 | September 24, 2002 | Marinacci |
6476858 | November 5, 2002 | Ramirez Diaz et al. |
6633231 | October 14, 2003 | Okamoto et al. |
6658091 | December 2, 2003 | Naidoo et al. |
6753774 | June 22, 2004 | Pan et al. |
6970183 | November 29, 2005 | Monroe |
7062291 | June 13, 2006 | Ryley et al. |
7065196 | June 20, 2006 | Lee |
7085361 | August 1, 2006 | Thomas |
7109860 | September 19, 2006 | Wang |
7193644 | March 20, 2007 | Carter |
7304572 | December 4, 2007 | Sheynman et al. |
7382249 | June 3, 2008 | Fancella |
7450638 | November 11, 2008 | Iwamura |
7643056 | January 5, 2010 | Silsby |
7683924 | March 23, 2010 | Oh et al. |
7683929 | March 23, 2010 | Elazar et al. |
7738917 | June 15, 2010 | Ryley et al. |
8139098 | March 20, 2012 | Carter |
8144183 | March 27, 2012 | Carter |
8154581 | April 10, 2012 | Carter |
8619136 | December 31, 2013 | Howarter et al. |
8872915 | October 28, 2014 | Scalisi et al. |
8780201 | July 15, 2014 | Scalisi et al. |
8823795 | September 2, 2014 | Scalisi et al. |
8842180 | September 23, 2014 | Kasmir et al. |
8937659 | January 20, 2015 | Scalisi et al. |
8941736 | January 27, 2015 | Scalisi |
8947530 | February 3, 2015 | Scalisi |
8953040 | February 10, 2015 | Scalisi et al. |
9013575 | April 21, 2015 | Scalisi |
9049352 | June 2, 2015 | Scalisi et al. |
9053622 | June 9, 2015 | Scalisi |
9058738 | June 16, 2015 | Scalisi |
9060103 | June 16, 2015 | Scalisi |
9060104 | June 16, 2015 | Scalisi |
9065987 | June 23, 2015 | Scalisi |
9094584 | July 28, 2015 | Scalisi et al. |
9113051 | August 18, 2015 | Scalisi |
9113052 | August 18, 2015 | Scalisi et al. |
9118819 | August 25, 2015 | Scalisi et al. |
9142214 | September 22, 2015 | Scalisi |
9160987 | October 13, 2015 | Kasmir et al. |
9165444 | October 20, 2015 | Scalisi |
9172920 | October 27, 2015 | Kasmir et al. |
9172921 | October 27, 2015 | Scalisi et al. |
9172922 | October 27, 2015 | Kasmir et al. |
9179107 | November 3, 2015 | Scalisi |
9179108 | November 3, 2015 | Scalisi |
9179109 | November 3, 2015 | Kasmir et al. |
9196133 | November 24, 2015 | Scalisi et al. |
9197867 | November 24, 2015 | Scalisi et al. |
9230424 | January 5, 2016 | Scalisi |
9237318 | January 12, 2016 | Kasmir et al. |
9247219 | January 26, 2016 | Kasmir et al. |
9253455 | February 2, 2016 | Harrison et al. |
9342936 | May 17, 2016 | Scalisi |
9508239 | November 29, 2016 | Harrison et al. |
9736284 | August 15, 2017 | Scalisi et al. |
9743049 | August 22, 2017 | Scalisi et al. |
9769435 | September 19, 2017 | Scalisi et al. |
9786133 | October 10, 2017 | Harrison et al. |
9799183 | October 24, 2017 | Harrison et al. |
20020094111 | July 18, 2002 | Puchek et al. |
20020147982 | October 10, 2002 | Naidoo et al. |
20030043047 | March 6, 2003 | Braun |
20040085205 | May 6, 2004 | Yeh |
20040085450 | May 6, 2004 | Stuart |
20040086093 | May 6, 2004 | Schranz |
20040095254 | May 20, 2004 | Maruszczak |
20040135686 | July 15, 2004 | Parker |
20050111660 | May 26, 2005 | Hosoda |
20060010199 | January 12, 2006 | Brailean et al. |
20060022816 | February 2, 2006 | Yukawa |
20060139449 | June 29, 2006 | Cheng et al. |
20060156361 | July 13, 2006 | Wang et al. |
20070008081 | January 11, 2007 | Tylicki et al. |
20100225455 | September 9, 2010 | Claiborne et al. |
20130057695 | March 7, 2013 | Huisking |
20140267716 | September 18, 2014 | Child et al. |
20150163463 | June 11, 2015 | Hwang et al. |
20170134698 | May 11, 2017 | Mahar |
2585521 | November 2003 | CN |
2792061 | June 2006 | CN |
0944883 | June 1998 | EP |
1480462 | November 2004 | EP |
2286283 | August 1995 | GB |
2354394 | March 2001 | GB |
2357387 | June 2001 | GB |
2400958 | October 2004 | GB |
2001-103463 | April 2001 | JP |
2002-033839 | January 2002 | JP |
2002-125059 | April 2002 | JP |
2002-342863 | November 2002 | JP |
2002-344640 | November 2002 | JP |
2002-354137 | December 2002 | JP |
2002-368890 | December 2002 | JP |
2003-283696 | October 2003 | JP |
2004-128835 | April 2004 | JP |
2005-341040 | December 2005 | JP |
2006-147650 | June 2006 | JP |
2006-262342 | September 2006 | JP |
2009-008925 | January 2009 | JP |
1998/39894 | September 1998 | WO |
2001/13638 | February 2001 | WO |
2001/93220 | December 2001 | WO |
2002/085019 | October 2002 | WO |
2003/028375 | April 2003 | WO |
2003/096696 | November 2003 | WO |
2006/038760 | April 2006 | WO |
2006/067782 | June 2006 | WO |
2007/125143 | August 2007 | WO |
Type: Grant
Filed: May 18, 2018
Date of Patent: Jan 5, 2021
Patent Publication Number: 20180341835
Assignee: Amazon Technologies, Inc. (Seattle, WA)
Inventor: James Siminoff (Pacific Palisades, CA)
Primary Examiner: Leon Flores
Application Number: 15/984,298